Results 141 to 150 of about 817,598 (242)

Tackling Hardware Trojans via Hardware-based Methodologies

open access: yes
Hardware Trojans (HTs) represent significant challenges to the security and reliability of modern microprocessorbased systems. This manuscript introduces two complementary approaches to enhance hardware security. First, programmable Hardware Security Modules are proposed to detect Hardware Trojan Horses by monitoring instruction-fetch activities ...
openaire   +1 more source

Transfer learning with XAI for robust malware and IoT network security. [PDF]

open access: yesSci Rep
Almadhor A   +6 more
europepmc   +1 more source

Tackling Hardware Trojan Horses via Hardware-based Methodologies

open access: yes
Hardware-based approaches to detect bit-flips, unauthorized program runs, and tampering.
openaire   +1 more source

Home - About - Disclaimer - Privacy